Analysis
-
max time kernel
151s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe
Resource
win10v2004-20220812-en
General
-
Target
bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe
-
Size
625KB
-
MD5
813a014ec0041c5474e65f9f4016e8b0
-
SHA1
650590b2cb664776910fb1d57f8ae343096ed276
-
SHA256
bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c
-
SHA512
4cde9965c0d6e2cf0df79886fd27a9d59f0757c7814aa976226e7b75f46ae0ce023fb9e3bf253c3c305320e418958630d065fa170223b876328ee54b42021a9c
-
SSDEEP
12288:OHjcoe9PH96vB/fAuBcm9TyOE/xG3muGx44MG4Yx:ODgINfAuBcgcZG2uG24MG4Y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1312 bapuzp.exe 1684 ~DFA52.tmp 360 icneep.exe -
Deletes itself 1 IoCs
pid Process 552 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 620 bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe 1312 bapuzp.exe 1684 ~DFA52.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe 360 icneep.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1684 ~DFA52.tmp -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 620 wrote to memory of 1312 620 bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe 27 PID 620 wrote to memory of 1312 620 bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe 27 PID 620 wrote to memory of 1312 620 bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe 27 PID 620 wrote to memory of 1312 620 bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe 27 PID 620 wrote to memory of 552 620 bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe 29 PID 620 wrote to memory of 552 620 bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe 29 PID 620 wrote to memory of 552 620 bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe 29 PID 620 wrote to memory of 552 620 bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe 29 PID 1312 wrote to memory of 1684 1312 bapuzp.exe 28 PID 1312 wrote to memory of 1684 1312 bapuzp.exe 28 PID 1312 wrote to memory of 1684 1312 bapuzp.exe 28 PID 1312 wrote to memory of 1684 1312 bapuzp.exe 28 PID 1684 wrote to memory of 360 1684 ~DFA52.tmp 31 PID 1684 wrote to memory of 360 1684 ~DFA52.tmp 31 PID 1684 wrote to memory of 360 1684 ~DFA52.tmp 31 PID 1684 wrote to memory of 360 1684 ~DFA52.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe"C:\Users\Admin\AppData\Local\Temp\bf0604787c8a8fca9380819903dcd1190930ae895cbc8c9c7ad9901af43ed59c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\bapuzp.exeC:\Users\Admin\AppData\Local\Temp\bapuzp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\~DFA52.tmpC:\Users\Admin\AppData\Local\Temp\~DFA52.tmp OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\icneep.exe"C:\Users\Admin\AppData\Local\Temp\icneep.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:360
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵
- Deletes itself
PID:552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341B
MD50ab879116d2f832638e2279a84b4d158
SHA1eeb6689135b759308a7c8b18c9d7128689333faf
SHA2569d77723737fff556ad558ee832086b511505e2ac9ed526cc3665b3441f4e1a22
SHA51227217f1ab2e62d7ffd4504057c3ead44dced4297e23df7f2b8b8950842b861c3aac2eb7f5e5bc440548c01fdf30cb59d5c3b2124715feab285e29e0f0e995b2d
-
Filesize
627KB
MD58cb2c2f058c02fbe1ef4cbd731c58986
SHA10e5dc8b6b3a1c9dfc68c4fc1256293c5b729c5e6
SHA25629001ac48db0ad6ec53ce81341347e71e76fae8e015bd0878dbbc03df9c0598b
SHA512f7ed54d7c23ae26b84b004b055cc94eb1edcbfcb0329dc28941a39d866ead911d3ccfc1935a0ca46532819c09197d3a59222c3f89037d2847d7bfa478f1efea0
-
Filesize
627KB
MD58cb2c2f058c02fbe1ef4cbd731c58986
SHA10e5dc8b6b3a1c9dfc68c4fc1256293c5b729c5e6
SHA25629001ac48db0ad6ec53ce81341347e71e76fae8e015bd0878dbbc03df9c0598b
SHA512f7ed54d7c23ae26b84b004b055cc94eb1edcbfcb0329dc28941a39d866ead911d3ccfc1935a0ca46532819c09197d3a59222c3f89037d2847d7bfa478f1efea0
-
Filesize
104B
MD586bb2dbeaef655893262f3c041f6afe2
SHA11b26ff1241c1353bd506c18bd0c11878076ba65d
SHA2564a57643d2c59d1235bc0926f845583f39345839e3e9428ad619eb4b6baf96ad2
SHA51258294cfaa5882a4c5625c03fe6f9e4882912b31f7169241f95626745d66c0a746083a9044365943d66ae7a420113d28c0ddd642c4ed697c683deb63796a13d31
-
Filesize
480B
MD5be8eacf4aa2d8806c14367732af696bd
SHA1d619c3875453a3be827b4bb3843ec09266213320
SHA2566b913c346cc0c3527aab478cac4b3ba3d4c935a1d52f305ddf7667d16413a7c5
SHA5125dad7651c199d43ffcc435d58f5cd5920192fbedaa3026236ff0bac7a56f9e0c427a3a5345c28c66bce2f1abe5b2950ae23f184d918f740e1babb6c63f02d82e
-
Filesize
408KB
MD5fbd3403d4e824170c16169b37d0c9563
SHA174da123e5e4282b721db84971d3b9939ac4562a8
SHA256e9b145ba9e79371c5f69e0fe13b4db97e7129abeb4b8d931a17de2c6acafddba
SHA5121eb23d093e4a0ee446b10c2d4770451e634930185226914e918d1e56df01fce00cd0af2e8e425629ce741574737efebafabc046b052a0fd7dce0cb0fc247a861
-
Filesize
629KB
MD592b2f86a018a94520d600638fbd5f480
SHA1454460eb276b824ca5f7726e1128a8dcc023f9f1
SHA256d394e57aa827fbaa81aecefb2694fd68099d619370aae6a605b9f52c4eb08dde
SHA51234a342c5ebabe1d8b32c47002564beb21d77012287d20e329aff365ca0fb33a5f6432472fc0ace1949c1c45a541e10c179faacf116be6a7f9d1624d708d682cc
-
Filesize
627KB
MD58cb2c2f058c02fbe1ef4cbd731c58986
SHA10e5dc8b6b3a1c9dfc68c4fc1256293c5b729c5e6
SHA25629001ac48db0ad6ec53ce81341347e71e76fae8e015bd0878dbbc03df9c0598b
SHA512f7ed54d7c23ae26b84b004b055cc94eb1edcbfcb0329dc28941a39d866ead911d3ccfc1935a0ca46532819c09197d3a59222c3f89037d2847d7bfa478f1efea0
-
Filesize
408KB
MD5fbd3403d4e824170c16169b37d0c9563
SHA174da123e5e4282b721db84971d3b9939ac4562a8
SHA256e9b145ba9e79371c5f69e0fe13b4db97e7129abeb4b8d931a17de2c6acafddba
SHA5121eb23d093e4a0ee446b10c2d4770451e634930185226914e918d1e56df01fce00cd0af2e8e425629ce741574737efebafabc046b052a0fd7dce0cb0fc247a861
-
Filesize
629KB
MD592b2f86a018a94520d600638fbd5f480
SHA1454460eb276b824ca5f7726e1128a8dcc023f9f1
SHA256d394e57aa827fbaa81aecefb2694fd68099d619370aae6a605b9f52c4eb08dde
SHA51234a342c5ebabe1d8b32c47002564beb21d77012287d20e329aff365ca0fb33a5f6432472fc0ace1949c1c45a541e10c179faacf116be6a7f9d1624d708d682cc